Course information

Certified Network Defender Certification Course Outline

Module 1: Network Attacks and Defence Strategies

  • Attack
  • Threat
  • Threat Sources
  • Threat Actors
  • Vulnerability
  • Risk
  • Network Attacks
  • Application Attacks
  • Social Engineering Attacks
  • Email Attacks
  • Mobile Attacks
  • Cloud Attacks
  • Supply Chain Attacks
  • Wireless Attacks
  • Hacking Methodologies and Frameworks
  • Adaptive Security Strategy
  • Defence-in-depth Security

Module 2: Administrative Network Security

  • Compliance
  • Regulatory Frameworks
  • Security Policies
  • Security Awareness
  • Asset Management
  • Recent Cybersecurity Trends

Module 3: Technical Network Security

  • Access Controls
  • Authentication
  • Authorisation
  • Accounting (AAA)
  • IAM
  • Cryptography
  • Network Segmentation
  • Zero Trust
  • Network Security Controls
  • Network Security Protocols

Module 4: Network Perimeter Security

  • Firewalls
  • Firewall Types
  • Firewall Topologies
  • Firewall Selection
  • Firewall Implementation and Deployment
  • Firewall Administration
  • IDS/IPS
  • IDS/IPS Classification
  • IDS/IPS Selection
  • False Positives
  • False Negatives
  • Router Security
  • Switch Security
  • Software-defined Perimeter (SDP)

Module 5: Endpoint Security-Windows Systems

  • Windows Security Risks
  • Windows Security Components
  • Windows Security Features
  • Windows Security Baseline Configurations
  • User Account and Password Management
  • Windows Patch Management
  • Windows User Access Management
  • Active Directory Security
  • Windows Network Services and Protocol Security
  • Windows Security Best Practices

Module 6: Endpoint Security-Linux Systems

  • Linux Security Risks
  • Linux Installation and Patching
  • Linux User Access and Password Management
  • Linux OS Hardening Techniques
  • Linux Network and Remote Access Security
  • Linux Security Tools and Frameworks

Module 7: Endpoint Security- Mobile Devices

  • Bring Your Own Device (BYOD)
  • Choose Your Own Device (CYOD)
  • Corporate Owned, Personally Enabled (COPE)
  • Company Owned, Business Only (COBO)
  • Mobile Device Management (MDM)
  • Mobile Application Management (MAM)
  • Mobile Threat Defence (MTD)
  • Unified Endpoint Management (UEM)
  • Mobile Email Management (MEM)
  • Mobile Content Management (MCM)
  • Enterprise Mobility Management (EMM)
  • Mobile Device Security
  • Android Security
  • iPhone Security

Module 8: Endpoint Security-IoT Devices

  • IoT Devices
  • IoT Application Areas
  • IoT Ecosystem
  • IoT Communication Models
  • IoT-Enabled Environments
  • IoT Security Risk and Challenges
  • IoT Security in IoT-Enabled IT Environments
  • IoT Security Tools
  • IoT Security Best Practices
  • IoT Security Standards, Initiatives, and Efforts

Module 9: Administrative Application Security

  • Application Whitelisting
  • Application Blacklisting
  • Application Sandboxing
  • Application Patch Management
  • Web Application Firewalls (WAFs)

Module 10: Data Security

  • Data Security
  • Data Encryption Data at Rest
  • Data Encryption at Transit
  • Data Masking
  • Data Backup
  • Data Retention
  • Data Destruction
  • Data Loss Prevention (DLP)
  • Data Integrity

Module 11: Enterprise Virtual Network Security

  • Network Virtualisation (NV)
  • Software-defined Network (SDN)
  • Network Function Virtualisation (NFV) Security
  • OS Virtualisation Security
  • Container Security
  • Docker Security
  • Kubernetes Security

Module 12: Enterprise Cloud Network Security

  • Cloud Computing
  • Cloud Security
  • Shared Responsibility Model
  • Amazon Cloud (AWS) Security
  • Microsoft Azure Cloud Security
  • Google Cloud Platform (GCP) Security

Module 13: Enterprise Wireless Network Security

  • Wireless Network
  • Wireless Standards
  • Wireless Topologies
  • Wireless Network Components
  • Wireless Network Encryption
  • Wireless Network Authentication
  • Wireless Network Security Measures
  • Wi-Fi Security Tools

Module 14: Network Traffic Monitoring and Analysis

  • Network Traffic Monitoring
  • Baseline Traffic Signatures
  • Suspicious Network Traffic Signatures
  • Threat Detection with Wireshark
  • Bandwidth Monitoring
  • Performance Monitoring
  • Network Anomaly Detection
  • Behaviour Analysis

Module 15: Network Logs Monitoring and Analysis

  • Logs
  • Windows Log Analysis
  • Linux Log Analysis
  • Mac Log Analysis
  • Firewall Log Analysis
  • Router Log Analysis
  • Web Server Log Analysis
  • Centralised Log Management

Module 16: Incident Response and Forensic Investigation

  • First Responder
  • Incident Handling and Response Process
  • SOAR
  • Endpoint Detection and Response (EDR)
  • Extended Detection and Response (XDR)
  • Forensics Investigation

Module 17: Business Continuity and Disaster Recovery

  • Business Continuity (BC)
  • Disaster Recovery (DR)
  • Business Continuity Management (BCM)
  • BC/DR Activities
  • Business Impact Analysis (BIA)
  • Recovery Time Objective (RTO)
  • Recovery Point Objective (RPO)
  • Business Continuity Plan (BCP)
  • Disaster Recovery Plan (DRP)

Module 18: Risk Anticipation with Risk Management

  • Risk Management
  • Risk Identification
  • Risk Assessment
  • Risk Treatment
  • Risk Treatment Steps
  • Risk Tracking and Review
  • Risk Management Frameworks (RMFs)
  • Vulnerability Management
  • Vulnerability Scanning
  • Vulnerability Reporting
  • Privacy Impact Assessment (PIA)

Module 19: Threat Assessment with Attack Surface Analysis

  • Attack Surface
  • Attack Surface Analysis
  • System Attack Surface
  • Network Attack Surface
  • Software Attack Surface
  • Physical Attack Surface
  • Human Attack Surface
  • Indicators of Exposures (IoEs)
  • Attack Simulation
  • Attack Surface Reduction
  • Attack Surface Monitoring Tools
  • Cloud and IoT Attack Surface Analysis

Module 20: Threat Prediction with Cyber Threat Intelligence

  • Cyber Threat Intelligence
  • Threat Intelligence Types
  • Indicators of Compromise (IoCs)
  • Indicators of Attack (IoA)
  • Threat Intelligence Layers
  • Threat Intelligence Sources
  • Threat Intelligence Feeds
  • Threat Intelligence Platforms (TIP)
  • Threat Hunting

Show moredowndown

Who should attend this Certified Network Defender Certification Course?

This CND Course is specifically designed for individuals who are focused on strengthening their capabilities in network defence against cyber threats. It is particularly beneficial for:

  • Network Security Professionals
  • System Administrators
  • Cybersecurity Analysts
  • IT Managers and Directors
  • Security Engineers
  • Network Architects

Prerequisites of the Certified Network Defender Certification Course

There are no formal prerequisites to attend this CND Training Course.

Certified Network Defender Certification Course Overview

A Network Defender is a cybersecurity professional who specialises in protecting networks from intrusion, attacks, and vulnerabilities. Their role is critical as they safeguard information systems from potential threats that can disrupt or damage operations. This training provides organisations with the expertise needed to secure their network infrastructure against cyber threats.

A CND Course is highly beneficial for IT professionals, Network Administrators, and Cybersecurity Analysts who aim to enhance their skills in protecting, detecting, and responding to network threats. It is also valuable for network engineers and security consultants seeking to deepen their knowledge in network defence strategies.

In The Knowledge Academy’s 5-day Certified Network Defender Certification Course, delegates will learn the essential components of network defence, including the implementation of secure architectures and the management of security policies. The course covers a broad range of topics from securing endpoint devices to managing cloud and virtual network environments.

Course Objectives

  • To understand network vulnerabilities and implement defence strategies
  • To manage and secure endpoint, mobile, and IoT environments
  • To deploy and maintain reliable network perimeter defences
  • To perform network monitoring and analyse security logs
  • To respond to and recover from network security incidents
  • To apply risk management principles and practices effectively

After attending this Certified Network Defender Certification Training, delegates will be equipped with the skills to effectively monitor, detect, and respond to network security threats. They will be able to apply best practices in network defence, manage risks associated with cyber threats, and ensure compliance with regulatory requirements.

Show moredowndown

What’s included in this Certified Network Defender Training Course?

  • Certified Network Defender Exam (312-38)
  • World-Class Training Sessions from Experienced Instructors
  • Certified Network Defender Certification
  • Digital Delegate Pack

Certified Network Defender Exam Information

The EC-Council Certified Network Defender (CND) exam evaluates a candidate knowledge and skills in network security. The exam format is as follows:

  • Question Type: Multiple Choice
  • Total Questions: 100 Questions
  • Duration: 4 Hours

Why choose us

Our Perth venue

Includes..

Free Wi-Fi

To make sure you’re always connected we offer completely free and easy to access wi-fi.

Air conditioned

To keep you comfortable during your course we offer a fully air conditioned environment.

Full IT support

IT support is on hand to sort out any unforseen issues that may arise.

Video equipment

This location has full video conferencing equipment.

Perth is the capital city of the Australian state – Western Australia. The population of Perth is approximately 2 million residents living in Greater Perth. The majority of Perth’s metropolitan area is located on the Swan Coastal Plain. Perth’s population increased vastly as a result of the Western Australian gold rushes in the late 19th century as well as Australia's involvement in World War II with a large number of British, Greek, Italian, and Yugoslavian immigrants moving to Australia after the war finished. Tourism has a huge impact on Perth’s economy with an estimated 2.8 million domestic visitors and 1 million internal visitors staying each year. There are many tourist attractions around Perth such as the Perth Cultural Centre and a number of museums such as The Scitech Discovery Centre in West Perth which is an interactive science museum and The Western Australian Maritime Museum which is home to many maritime objects from different eras. There are a number of primary schools in Perth with each one consisting of seven grades and high schools consisting of years 7-12. Education is compulsory between the ages of six and seventeen in Western Australia. Education is a three-tiered system consisting of primary education, secondary education, and tertiary education. Perth is home to four public universities with the main one being The University of Western Australia which has around 20,000 undergraduate students and 6,000 postgraduate students as well as 1,500 academic staff and 2,200 administrative staff. The University of Western Australia has produced 100 Rhodes Scholars, one Nobel Prize laureate, and one Australian Prime Minister. Curtin University is another public university in Perth and has around 48,000 undergraduate and postgraduate students and 3,700 administrative staff. Curtin has a range of academic and practical fields such as Resources and Energy, Information and Communication, Health, Ageing and Well-being, Communities and Changing Environments, and Growth and Prosperity, and Creative Writing.

Show moredown

Address

Contact us for more information

T: +61 272026926

Ways to take this course

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led Certified Network Defender Certification Training in Perth. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

Unlock your potential with The Knowledge Academy's Certified Network Defender Certification Training in Perth, accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.

Experience the most sought-after learning style with The Knowledge Academy's Certified Network Defender Certification Training in Perth. Available in 490+ locations across 190+ countries, our hand-picked Classroom venues offer an invaluable human touch. Immerse yourself in a comprehensive, interactive experience with our expert-led Certified Network Defender Certification Training in Perth sessions.

best_trainers

Highly experienced trainers

Boost your skills with our expert trainers, boasting 10+ years of real-world experience, ensuring an engaging and informative training experience

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

Our Classroom courses with limited class sizes foster discussions and provide a personalised, interactive learning environment

value_for_money

Great value for money

Achieve certification without breaking the bank. Find a lower price elsewhere? We'll match it to guarantee you the best value

Streamline large-scale training requirements with The Knowledge Academy's In-house/Onsite at your business premises. Experience expert-led classroom learning from the comfort of your workplace and engage professional development.

tailored_learning_experience

Tailored learning experience

Leverage benefits offered from a certification that fits your unique business or project needs

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

Our offers a unique chance for your team to bond and engage in discussions, enriching the learning experience beyond traditional classroom settings

monitor_progress

Monitor employees progress

The course know-how will help you track and evaluate your employees' progression and performance with relative ease

What our customers are saying

Certified Network Defender Certification Training in Perth FAQs

The Certified Network Defender (CND) Certification validates skills in network security, focusing on protection, detection, and response to threats. It is designed for network administrators and security professionals.
The CND exam assesses skills in network security management, threat assessment, vulnerability analysis, risk mitigation, and incident response, along with knowledge of network defence strategies and tools.
There are no formal prerequisites to attend this CND Training Course.
The CND Training covers network security management, threat detection, vulnerability analysis, risk mitigation, incident response, network defence strategies, and the use of security tools.
The EC-Council Certified Network Defender (CND) Course lasts for 5 days, offering comprehensive training in network security.
Candidates often struggle with grasping complex network security concepts, managing extensive study materials, and balancing exam preparation with other responsibilities.
Certified Network Defenders can pursue careers as network administrators, security analysts, IT security managers, and cybersecurity consultants.
Recommended resources include EC-Council official study guides, practice exams, online forums, training courses, and cybersecurity textbooks.
The CND Course focuses on practical network defense skills, emphasising real-world scenarios and hands-on training, distinguishing it from more theory-based certifications.
Certified Network Defender Training enhances a candidate's credibility by validating their expertise in network security, showcasing their practical skills, and commitment to professional development.
Candidates can access study guides, practice exams, and forums to aid their preparation for the Certified Network Defender Certification exam.
The Knowledge Academy stands out as a prestigious training provider known for its extensive course offerings, expert instructors, adaptable learning formats, and industry recognition. It's a dependable option for those seeking Certified Network Defender Certification.
The training fees for Certified Network Defender Certificationin Perth starts from AUD9995
The Knowledge Academy is the Leading global training provider for Certified Network Defender Certification.
Show more down

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on EC – Council Certification Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on +61 272026926 and speak to our training experts, we should be able to help you with your requirements.

cross

BIGGEST
BLACK FRIDAY SALE!

red-starWHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.